Networking in 2023
Cellular Vehicle-To-Everything (C-V2x)
by
Hu, Jinling, Zhao, Li, Chen, Shanzhi
Early Soft Error Reliability Assessment of Convolutional Neural Networks Executing on Resource-Constrained Iot Edge Devices
by
Ost, Luciano, Reis, Ricardo, Abich, Geancarlo
Computer Vision and Machine Intelligence Paradigms for Sdgs: Select Proceedings of Icrtac-Cvmip 2021
by
Visual Data Insights Using SAS Ods Graphics: A Guide to Communication-Effective Data Visualization
by
Bessler, Leroy
Signal Integrity: Applied Electromagnetics and Professional Practice
by
Russ, Samuel H.
Network Automation with Go: Learn how to automate network operations and build applications using the Go programming language
by
Leiva, Nicolas, Kashin, Michael
Intelligent Computing and Communication for the Internet of Vehicles
by
Li, Mushu, Gao, Jie, Shen
Connecting the Internet of Things: Iot Connectivity Standards and Solutions
by
Kumar, Anil, Hussain, Jafer, Chun, Anthony
Wireless Penetration Testing: Run Wireless Networks Vulnerability Assessment, Wi-Fi Pen Testing, Android and IOS Application Security, and Break Wep
by
El Fiky, Ahmed Hashem
Handbook on Networked Multipoint Multimedia Conferencing and Multistream Immersive Telepresence Using Sip: Scalable Distributed Applications and Media
by
Ranjan Roy, Radhika
Cloud VR: Technology and Application
by
Huang, Kun, Xiong, Huaping, Li, Dawei
Smart Grid in IoT-Enabled Spaces: The Road to Intelligence in Power
by
Al-Turjman, Fadi
Wireless Localization Techniques
by
Tong, Xinyu, Tian, Xiaohua, Wang, Xinbing
Cloud Computing
by
Upadhyay, Anurag, Kumar, Anshul
Microsoft Azure for Dummies
by
Hyman, Jack A.
Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
by
Cambric, Shinesa, Ratemo, Michael
Wie kommt Ethik in die künstliche Intelligenz? Prinzipien, Merkmale und Leitlinien einer ethischen KI
by
Anonymous
Optisystem Program for Various Fiber Optic Modeling
by
Kurnaz, Sefer, Abdu Ibrahim, Abdullahi, Muataz Abdulwahid, Maan
Security in Smart Home Networks
by
Shen, Meng, Yan, Zhu, Haojin
Industrial IoT for Architects and Engineers: Architecting secure, robust, and scalable industrial IoT solutions with AWS
by
Bernal, Joey, Sridhar, Bharath
DevSecOps in Practice with VMware Tanzu: Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio
by
Hardt, Robert, Pandit, Parth
High-Performance It Services
by
Critchley, Terry
Кооперативная связь в ко
by
Пратап К., Бе, Лет Г., Шине, Бала Г., Джоk
Kooperative Kommunikation in kognitiven 5G-Funksystemen
by
Pratap C., Benin, Let G., Shine, Bala G., Josemin
Comunicação Cooperativa em Sistemas de Rádio Cognitivo 5G
by
Pratap C., Benin, Let G., Shine, Bala G., Josemin
Communication coopérative dans les systèmes radio cognitifs 5G
by
Pratap C., Benin, Let G., Shine, Bala G., Josemin
Comunicazione cooperativa nei sistemi radio cognitivi 5G
by
Pratap C., Benin, Let G., Shine, Bala G., Josemin
Анализ научных данных с п
by
Сюй, Цяньв&#, Чанг, Викт&#, Сонгала, Е&#
Wissenschaftliche Datenanalyse mit NEO4J
by
Xu, Qianwen Ariel, Chang, Victor, Songala, Yeshwanth Kumar
Analyse de données scientifiques à l'aide de NEO4J
by
Xu, Qianwen Ariel, Chang, Victor, Songala, Yeshwanth Kumar
Analisi dei dati scientifici con NEO4J
by
Xu, Qianwen Ariel, Chang, Victor, Songala, Yeshwanth Kumar
Análise de dados científicos usando o NEO4J
by
Xu, Qianwen Ariel, Chang, Victor, Songala, Yeshwanth Kumar
Compliance Made Easy
by
Cybersecurity Experts, Leading
Cloud Computing
by
Upadhyay, Anurag, Kumar, Anshul
Enhanced Cyber Security in IoT Using Deep Belief Network
by
P. M., Prathibhavani
Смягчение атак в архитек
by
Шоу, Дилип &
Atténuation des attaques dans l'architecture NDN à l'aide de techniques de filtrage d'eau
by
Shaw, Dilip Kumar
Atenuação de ataques na Arquitectura NDN utilizando Técnicas de Marca de Água
by
Shaw, Dilip Kumar
Mitigazione degli attacchi nell'architettura NDN mediante tecniche di watermarking
by
Shaw, Dilip Kumar
Entschärfung von Angriffen in der NDN Architektur durch Wasserzeichen Techniken
by
Shaw, Dilip Kumar
Microsoft 365 Administration Inside Out
by
Kegg, Darryl, Fisher, Ed, Guilmette, Aaron
Trustworthy Autonomic Computing
by
Eze, Thaddeus
The Spatial Grasp Model: Applications and Investigations of Distributed Dynamic Worlds
by
Sapaty, Peter Simon
Multiple Routing Configurations for Fast IP recovery in Ad Hoc Network
by
L, Raghavendar Raju
Artificial Intelligence in Data Mining Techniques
by
Refonaa, J., Dhamodaran, S., Yovan Felix, A.
Visual Inference for Iot Systems: A Practical Approach
by
Fernández-Berni, Jorge, Rodríguez-Vázquez, Angel, Velasco-Montero, Delia
Access Control Models and Architectures for Iot and Cyber Physical Systems
by
Gupta, Maanak, Bhatt, Smriti, Alshehri, Asma Hassan
Maschinelles Lernen
by
Dhanalakshmi, R., Soundari, A. Gnana
Apprentissage Machine
by
Soundari, A. Gnana, Dhanalakshmi, R.
Apprendimento Automatico
by
Soundari, A. Gnana, Dhanalakshmi, R.
Aprendizagem de Máquinas
by
Dhanalakshmi, R., Soundari, A. Gnana
МАШИННОЕ ОБУЧЕНИЕ
by
Саундари, &#, Дханалак

Implementing Cellular IoT Solutions for Digital Transformation: Successfully develop, deploy, and maintain LTE and 5G enterprise IoT systems
by
McCain, Dennis
Cloud-Computing
by
Upadhyay, Anurag, Kumar, Anshul
Informatique En Nuage
by
Upadhyay, Anurag, Kumar, Anshul
Cloud Computing
by
Kumar, Anshul, Upadhyay, Anurag
Computação Em Nuvem
by
Upadhyay, Anurag, Kumar, Anshul
ОБЛАЧНЫЕ ВЫЧИСЛЕНИЯ
by
УПАДХЫАЫ, &#, КУМАР, АНС&#
Practical Rust 1.x Cookbook: 100+ Solutions across Command Line, CI/CD, Kubernetes, Networking, Code Performance and Microservices
by
Team, Rustacean
Cloud Computing Playbook: 10 In 1 Practical Cloud Design With Azure, Aws And Terraform
by
Miller, Richie
Разработка новой модели
by
Иссак, Фра&#, Ишвария, М.
Desenvolvimento de Modelo Novel para Usuários Confiáveis Recomendação em OSN
by
Ishwariya, M., Issac, Franklin
Entwicklung eines neuartigen Modells für die Empfehlung vertrauenswürdiger Nutzer in OSN
by
Ishwariya, M., Issac, Franklin
Sviluppo di un nuovo modello per la raccomandazione di utenti affidabili in OSN
by
Ishwariya, M., Issac, Franklin
Client Logbook: A client log book is a written record of a client's interactions with a particular service or organization.
by
Publishing, Myjwc
Concepts, Applications, Experimentation and Analysis of Wireless Sensor Networks
by
Fahmy, Hossam Mahmoud Ahmad
Développement d'un nouveau modèle pour la recommandation d'utilisateurs fiables dans les OSN
by
Issac, Franklin, Ishwariya, M.
Городские приложения
by
Мерсье, Си&#, Росарио, Ж&#
Computer Vision - Eccv 2022 Workshops: Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part I
by
Content Distribution for Mobile Internet: A Cloud-Based Approach
by
Dai, Yafei, Chen, Guihai, Li, Zhenhua
IoT avec les balises BLE
by
Padiya, S. D., Gulhane, V. S.
Matrix and Analytical Methods for Performance Analysis of Telecommunication Systems
by
Gaidamaka, Yuliya, Yarkina, Natalia, Naumov, Valeriy
Computer Vision - Eccv 2022 Workshops: Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part V
by
Техника стандартизации &
by
Ишвария, М., Иссак, Р. Фр&
Eine Technik zur Standardisierung von Big Data für Datenmanagement-Anwendungen
by
Ishwariya, M., Issac, R. Franklin
Une technique de normalisation du Big Data pour l'application de gestion des données
by
Issac, R. Franklin, Ishwariya, M.
Una tecnica di standardizzazione dei Big Data per le applicazioni di gestione dei dati
by
Issac, R. Franklin, Ishwariya, M.
Uma Grande Técnica de Padronização de Dados para Aplicação de Gestão de Dados
by
Ishwariya, M., Issac, R. Franklin
Cisco Cloud Infrastructure
by
Shukla, Avinash, Patel, Jalpa, Panzade, Komal
Computer Vision - Eccv 2022 Workshops: Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part VI
by
Künstliche Intelligenz: Das Wichtigste, was Du wissen musst
by
Simon, Walter
Биологически вдохновле&#
by
ДЭВИ, В. Соу&, КУМАР, Ч. Ни&
Обеспечение качества си&
by
Р. Г., Бабука&
Взаимодействие на основ&
by
Кумар Пар, Нандихал, &#, Г К, Сухас
Qualitätssicherung eines agentenbasierten Systems
by
R. G., Babukarthik Sridevi
Garantia de qualidade do sistema baseado em agentes
by
R. G., Babukarthik Sridevi
Bio-inspiriertes und vertrauensbasiertes Clustering-Routing-Protokoll
by
Devi, V. Sowmya, Kumar, Ch Niranjan
Protocolo de roteamento de cluster baseado em confiança e bioinspirado
by
Devi, V. Sowmya, Kumar, Ch Niranjan
Empfehlungsbasierte Interaktion
by
Kumar Pareek, Piyush, Nandihal, Priya, G. K., Suhas
Interaction basée sur les recommandations
by
Kumar Pareek, Piyush, Nandihal, Priya, G. K., Suhas
Interazione basata su raccomandazioni
by
Nandihal, Priya, G. K., Suhas, Kumar Pareek, Piyush
Interação Baseada em Recomendação
by
Nandihal, Priya, G. K., Suhas, Kumar Pareek, Piyush
Protocole de routage de clustering bio-inspiré et basé sur la confiance
by
Kumar, Ch Niranjan, Devi, V. Sowmya
Protocollo di routing di clustering basato su bio-ispirazione e fiducia
by
Devi, V. Sowmya, Kumar, Ch Niranjan
Assurance de la qualité des systèmes basés sur des agents
by
R. G., Babukarthik Sridevi
Garanzia di qualità del sistema ad agenti
by
R. G., Babukarthik Sridevi
A Proactive Network Surveillance Framework
by
Singh, Maninder